If there’s one thing you can rely on, it’s maximum data security with ta Triumph-Adler. Modern office communication of today has to be fast, easy and – above all else – secure! Due to growing transparency as well as continuously to be mindful of the security of your company’s data. accelerating and highly digitised business processes, We can provide you with comprehensive support today there are increasing data security requirements thanks to our optional Data Security Kits in line with regarding the creation, distribution and archiving of the international Common Criteria security standard information. Modern means of communication and (ISO 15408 EAL3). The solution range from ta Triumph- innovative technical solutions now characterise busi- Adler addresses all levels, from local security features at nesses and significantly contribute to efficiency, system level right through to guaranteeing extensive making it all the more important to eliminate unau- network protection. Whether it’s standard integrated thorised intrusions into the network and to prevent security solutions or customised, upgradeable security external access to sensitive data. Data protection is also packages, ta Triumph-Adler is your safe choice for gaining legal significance, providing one more reason copying, printing, scanning and faxing data. Where are the gaps in your armour? Source documents that are temporarily stored as electronic processing and administration and also protecting data on a hard disk or in a temporary memory during archived or temporarily stored print data, for example, copying or scanning remain there until replaced by new in a document box on a hard disk, from being read out data. Ideally, these documents should be permanently without authorisation. overwritten rather than simply deleted in order to eliminate the theoretical possibility of unauthorised Faxing, however, is a different matter. Data is only data readout. exchanged here in the form of compressed image files via the public telephone network. Intrusion into the Highly secure printing specifically involves safeguard- network and external access to the data are therefore ing data streams from unauthorised access during their not possible, even in the case of a network fax. We support your security concept at both system and network level. Security always depends on the optimal interaction of in use, for example, fax, printing or scanning functions all available components. Therefore the security fea- using a network connection or copying function using tures of ta Triumph-Adler apply to the system itself the hard disk. However, the success of this approach and, more importantly, they apply at the network level. also fundamentally depends on the company’s respon- In this way, the most suitable security requirements can sible handling of sensitive data and passwords. be defined according to the functionality of the systems Active network support: Authentication using Windows Server 2012 as an example: Large companies that use domain servers Network authentication: < Kerberos > Panel: User name and password Windows 2012 Server (Active Directory Service) Client PC Driver and utility Network authentication: ON Network authentication Security features for printing Login based on user name and password only n All current network encryptions are supported Embedded web server authentication Set-up of a password query in the printer (Internet access to the system) driver for printing and storing print jobs n Allows you to set an administrator password n Access to the Embedded Web Server can also be encrypted Use of a security water mark to label copies of printouts that were created without authorisation Support of default network settings, IP and port filters including during scanning (SMB, FTP), n Allows access to the system using through authentication registered IP addresses only Increased security for the sending and SSL encryption of the printing receiving of emails by restricting the n Prevents readout of data by encrypting the print domain (e.g.,[email protected]) data stream, including the transmission path Security functions available on the system: Security kit ) Send Copy Send Print Send 1. Overwriting of unwanted data 2. Encryption ( ) / Decryption ( Backup of data and various settings Authentication via password entry Print Hard disk n Overwrites data and memory areas that n Protects the system from third-party access are no longer required and in which data n Also allows procedure control and has already been logically deleted management code allocation for copying, printing, scanning and faxing n Renders the restoration of data almost impossible n Triple overwrite (standard setting): Repeat copy blocking The same area as before is overwritten n Prevents the repeated printing out of twice with a random pattern and then the last copy (or copies) created filled with zeros n Depending on the system, this is carried out via the system menu or using an Encryption and compression of PDF files optional Data Security Kit n Restricts the opening, printing and editing of PDF files created on the system (Partial) blocking of the display n Prevents system settings from being changed n Right of access is thus restricted to the administrator Authentication standard IEEE 802.1X n This standard supports a port-based authentication n Only authorised users and devices are able to connect with the network Blocking of the USB host n Stops direct printing of PDFs to and scanning to USB sticks Simplified network authentication with the system using optional card systems (as part of ACCOUNTING4WORK) Data Security Kit in accordance with the international Common Criteria security standard (ISO 15408 EAL3) for the overwriting n Follow2Print: intelligent re-routing of print jobs to individually definable output systems n SecurePrinting: maximum flexibility through and encryption of data support of various card systems, for instance in n Automatically encrypts documents and user conjunction with a central locking system data before they are stored on a hard disk Securely prepared Be it multifunctional systems, printers, copiers or fax company’s need for handling sensitive data and machines – all of the systems in your office environ- passwords in a responsible manner. ment will contribute to securing your information stream and to closing the gaps in the process using We will be happy to provide you on request with our extensive and innovative security functions. a security white paper, which contains a detailed Corresponding user security features are actively overview of all standard system configurations and supported in the network, optimally meeting your the suitable security options. Designing solutions to increase your efficiency. ta Triumph-Adler has set itself the objective of service support ensure you uninterrupted, productive organising how you handle documents on a daily basis use of our systems. Thanks to this range of services we as efficiently as possible. The technical perfection of are able to provide you with the ideal solution. our products combined with in-depth analyses, comprehensive consultation and subsequent on-site ta Triumph-Adler GmbH Ohechaussee 235 22848 Norderstedt, Germany Tel.: +49 40 52849-0 Fax: +49 40 52849-120 [email protected] www.triumph-adler.com
© Copyright 2026 Paperzz